Media and Crime in the U S 1st Edition By Jewkes – Test Bank
Chapter 9: The Role of the Internet in Crime and Deviance
Test Bank
Multiple Choice
1. Facebook had, as of the end of 2016, ______ billion active users.
a. 1.14
b. 1.28
c. 1.56
d. 1.79
Ans: D
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
2. Facebook is worth ______ billion.
a. 20
b. 50
c. 70
d. 100
Ans: B
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
3. Facebook accessed by ______ billion people every day.
a. 1.18
b. 1.25
c. 1.79
d. 1.56
Ans: A
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
4. Which of the following entities was established in 1995?
a. eBay
b. Google
c. Wikipedia
d. YouTube
Ans: A
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
5. Google was established in:
a. 1995.
b. 1998.
c. 2001.
d. 2005.
Ans: B
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
6. Which of the following online entities was established in 2001?
a. eBay
b. Google
c. Wikipedia
d. Twitter
Ans: C
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
7. Twitter was established in:
a. 2005.
b. 2007.
c. 2009.
d. 2011.
Ans: B
Cognitive Domain: Knowledge
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
8. The global Internet population is at a ______ penetration (representing 918.3% growth since 2000).
a. 20.5%
b. 50.1%
c. 76.1%
d. 83.9%
Ans: B
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
9. Leading the world table is ______ where 89% of the population are online.
a. South America
b. North American
c. Latin America
d. Europe
Ans: B
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
10. Just 28.7% of ______ population has Internet access.
a. North America
b. South American
c. Africa’s
d. New Zealand
Ans: C
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
11. Of the total world Internet users by region, 50.2% are in ______.
a. Asia
b. Europe
c. North American
d. the Middle East
Ans: A
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
12. Of the total world Internet users by region, 16.7% are in:
a. Asia.
b. the Middle East.
c. Latin America.
d. Europe.
Ans: D
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
13. In terms of languages, 948.6 million Internet users communicate in English, followed next by ______ language speakers at 751.9 million.
a. Portuguese
b. Japanese
c. Chinese
d. Arabic
Ans: C
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
14. Use of the Internet in China grew from 22 million in 2000 to approximately ______ by mid-2016.
a. 179 million
b. 490 million
c. 581 million
d. 721 million
Ans: D
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
15. Chinese entrepreneur Jack Ma has set up Taobao to compete with ______.
a. Twitter
b. Wikipedia
c. eBay
d. Google
Ans: C
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
16. ______ has also become the home of much activity that criminologists usually refer to by the shorthand term “cybercrime.” “
a. Russia
b. Saudi Arabia
c. Japan
d. China
Ans: D
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
17. All of the following are examples of cybercrime except:
a. credit card theft.
b. investment fraud.
c. burglary.
d. piracy.
Ans: C
Cognitive Domain: Application
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
18. Examples of computer-oriented crimes include which of the following?
a. malicious software
b. denial of service attacks
c. defacement
d. all of these
Ans: D
Cognitive Domain: Application
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
19. ______ is now home to the world’s largest collection of malware-infected computers.
a. Tokyo
b. Beijing
c. Paris
d. London
Ans: B
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
20. Which of the following were areas of terrorist practice that have been enhanced by the Internet and the Web?
a. finance
b. security
c. learning
d. all of these
Ans: D
Cognitive Domain: Application
Answer Location: Cyberwarfare and Cyberterrorism
Difficulty Level: Easy
21. All of the following were identified as forms of invasion of privacy except:
a. spamming.
b. stalking.
c. trolling.
d. defamation.
Ans: C
Cognitive Domain: Application
Answer Location: Invasion of Privacy, Defamation, and Identity Theft
Difficulty Level: Easy
22. One increasingly prevalent crime, originating particularly in countries in West Africa, and targeting women in Europe and the United States, is ______.
a. credit card fraud
b. online dating scams
c. Ponzi schemes
d. investment fraud
Ans: B
Cognitive Domain: Comprehension
Answer Location: Invasion of Privacy, Defamation, and Identity Theft
Difficulty Level: Easy
23. Phishing takes place when communications purporting to come from legitimate organizations target Internet users, inducing them to voluntarily surrender sensitive financial information.
a. spamming
b. phishing
c. stalking
d. trolling
Ans: B
Cognitive Domain: Comprehension
Answer Location: Invasion of Privacy, Defamation, and Identity Theft
Difficulty Level: Easy
24. Users of eBay reported an estimated total of more than ______ crimes in 2007.
a. 2,000
b. 4,000
c. 6,000
d. 8,000
Ans: D
Cognitive Domain: Knowledge
Answer Location: eBay Fraud
Difficulty Level: Easy
25. According to one report, police investigate an alleged eBay scam every ______.
a. minute
b. hour
c. day
d. week
Ans: B
Cognitive Domain: Knowledge
Answer Location: eBay Fraud
Difficulty Level: Easy
True/False
1. Social networking sites are used by people of all ages, they have particularly revolutionized the ways in which young people communicate, compete, and interact.
Ans: T
Cognitive Domain: Comprehension
Answer Location: The Role of the Internet in Crime and Deviance
Difficulty Level: Easy
2. Start-up costs of Internet access are still prohibitively high for the poorest people in the world.
Ans: T
Cognitive Domain: Knowledge
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
3. Regional growth in Internet use is always smooth and continuous.
Ans: F
Cognitive Domain: Comprehension
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
4. Developed countries will benefit from increased access to knowledge, increased economic flexibility, and increased communication efficiency.
Ans: T
Cognitive Domain: Comprehension
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
5. The biggest distributor of online video in China is Yukou Tudou, which has overtaken YouTube with over 12bn megabytes of data transfers every day.
Ans: F
Cognitive Domain: Comprehension
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
6. The Russian media have been described as being in transition between totalitarianism and market authoritarianism
Ans: F
Cognitive Domain: Comprehension
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
7. All Chinese Internet Service Providers (ISPs) have to register with the police and all Internet users must sign a declaration that they will not visit forbidden sites.
Ans: T
Cognitive Domain: Comprehension
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
8. Cybercrime is a word that encompasses both “computer-assisted” and “computer-Oriented” crimes.
Ans: T
Cognitive Domain: Comprehension
Answer Location: Redefining Deviance and Democratization: Developing Nations and the Case of China
Difficulty Level: Easy
9. Patents are considered intellectual property.
Ans: T
Cognitive Domain: Knowledge
Answer Location: Electronic Theft and Abuse of Intellectual Property Rights
Difficulty Level: Easy
10. Electronic reproduction of data can take many forms. One of the most common is “peer-to-peer” (or P2P) file-sharing
Ans: T
Cognitive Domain: Knowledge
Answer Location: Electronic Theft and Abuse of Intellectual Property Rights
Difficulty Level: Easy
11. Trolling is formerly known as flaming.
Ans: T
Cognitive Domain: Knowledge
Answer Location: Hate Crime
Difficulty Level: Easy
12. Every U.S. state has some form of antibullying law.
Ans: T
Cognitive Domain: Knowledge
Answer Location: Hate Crime
Difficulty Level: Easy
13. Digital piracy is not costing the film and music industry.
Ans: F
Cognitive Domain: Comprehension
Answer Location: Electronic Theft and Abuse of Intellectual Property Rights
Difficulty Level: Easy
14. Invasion of privacy takes many forms from “spamming” to online defamation, stalking, and violence.
Ans: T
Cognitive Domain: Comprehension
Answer Location: Invasion of Privacy, Defamation, and Identity Theft
Difficulty Level: Easy
15. Identity theft is more strongly experienced by young people.
Ans: F
Cognitive Domain: Comprehension
Answer Location: Invasion of Privacy, Defamation, and Identity Theft
Difficulty Level: Easy
Essay
1. What are the six areas of terrorist practice that have been substantially altered or enhanced by the Internet and the Web? Can anything be done to prevent those practices from taking place?
Ans: According to Dorothy Denning (2010), the six areas of terrorist practice are media operations, attacks, recruitment, learning, finance, and security.
Cognitive Domain: Comprehension
Answer Location: Cyberwarfare and Cyberterrorism
Difficulty Level: Easy
2. How do cyberterrorism and cyberwarfare impact countries?
Ans: According to the authors, cyberwarfare and cyberterrorism may be used to disable a country’s infrastructure, meddle with the integrity of another country’s internal military data, confuse its financial transactions, or to accomplish any number of other possibly crippling aims.
Cognitive Domain: Comprehension
Answer Location: Cyberwarfare and Cyberterrorism
Difficulty Level: Medium
3. What is sexting? Research your states’ actions in preventing sexting and cyberbullying. What is being done to prevent sexting from taking place?
Ans: Sexting takes place when an individual sends nude or suggestive photos of themselves over their mobile phone. According to police reports, predatory adults are taking advantage of the willingness of young people to experiment with their sexuality over the Net by engaging in sexually explicit chat and by exposing their bodies in front of a webcam. Governments have launched education campaigns aiming to educate young people about the dangers of the practice and warn them of the consequences which can include bullying, harassment, sexual assault, and so on.
Cognitive Domain: Analysis
Answer Location: Childhood, Cyberspace, and Social Retreat
Difficulty Level: Hard
4. Given the recent controversy concerning the November 2016 presidential election. What is the current stance of the Russian hacking probe? What can be done to prevent hacking attacks such as those in future elections?
Ans: Students should research the current position of the probe via reputable news media.
Cognitive Domain: Analysis
Answer Location: Hacking and Loss of Sensitive Data
Difficulty Level: Hard
5. What can be done to prevent individuals from identity theft?
Ans: However, the majority of them should center on the protection of ones personal items (i.e., passwords, bank account information, etc.).
Cognitive Domain: Analysis
Answer Location: Invasion of Privacy, Defamation, and Identity Theft
Difficulty Level: Easy
Reviews
There are no reviews yet.